Latest Posts :

Good Basics to Beginners

Differences Between Virus,Worms,Trojans and other Malwares 
                                                                                                                                                                                                                                       Malware: The word Malware is short for malicious software, and is a general term used to describe all of the viruses, worms, spyware, and pretty much anything that is specifically designed to cause harm to your PC or steal your information.
</thread>:
A thread is a path of execution. In it's simplest form think of it as a simple program that executes a loop. The more of these that you can run, in parallel, the more work can be done,A thread virus is a virus that resembles a string or thread because it abnormal long shape, sometimes they may be curled up into a sort of circular form to resemble a normal virus cell. 

</Virus>:
The term computer virus is often used interchangeably with malware, though the two don't actually have the same meaning. In the strictest sense, a virus is a program that copies itself and infects a PC, spreading from one file to another, and then from one PC to another when the files are copied or Most viruses attach themselves to executable files, but some can target a master boot record, autorun scripts, MS Office macros, or even in some cases, arbitrary files.
Example:if the file is supposed to be an mp3, and the name ends in .mp3.exe, you're dealing with a virus.

</Trojan horse/Trojan>:
                                        Trojans are named after the mythological trojan horse. To conquer the city of Troy, the Greeks constructed a wooden horse and presented it to the Trojans as a gift. The Trojans accepted the gift into their city. Later that night, Greek soldiers emerged from the inside of the hollow wooden horse, opened the city gate – and you can imagine what followed.A trojan horse is the same sort of thing. Trojan horses masquerade as useful software, such as a legitimate program or an illicit crack for a legitimate program. Instead of being well-behaved software, a trojan opens a backdoor on your system.
{Note}:Virus and worms are the same but not the same in the way they spread while Trojan's cant spread
by its own.     

</Backdoor / Bot>:
A backdoor is usually a piece of software implemented by the authors themselves that enables access to your PC or any kind of protected function of a computer program. Backdoors are often installed once Trojans have been executed, so whoever attacks your PC will gain direct access to your PC. The infected PC, also called "bot", will become part of a bot net.

</Worms>:
                 Computer worms use the network to send copies of themselves to other PCs, usually utilizing a security hole to travel from one host to the next, often automatically without user intervention. Because they can spread so rapidly across a network, infecting every PC in their path, they tend to be the most well-known type of malware, although many users still mistakenly refer to them as viruses.
</Blended Threads>
                        Added into the mix, we also have what is called a blended threat. A blended threat is a more sophisticated attack that bundles some of the worst aspects of viruses, worms, Trojan horses and malicious code into one single threat. Blended threats can use server and Internet vulnerabilities to initiate, then transmit and also spread an attack.

</Vulnerability>:
                        Funny thing about software: it’s written by humans. Humans are fallible and sometimes forget to cross t’s and dot i’s.Sometimes those mistakes create strange behavior in programs. And sometimes that strange behavior can be used to create a hole that malware or hackers could use to get into your machine more easily. That hole is otherwise known as a vulnerability.

</Exploit>:
                        The strange behavior that can be used to create a hole for hackers or malware to get through generally requires someone to use a particular sequence of actions or text to cause the right (or is that wrong?) conditions. To be usable by malware (or on a larger scale by hackers), it needs to be put into code form, which is also called exploit code.

</Root kit>:
                    Rootkits are computer programs that are designed by attackers to gain root or administrative access to your computer. Once an attacker gains admin privilege, it becomes a cakewalk for him to exploit your system.

</Spyware>(Key loggers):
                                Spyware – Spyware spies on you. Spyware encompasses everything from “key loggers” that log your keystrokes to steal your credit card information and online banking passwords.
</Scare ware>(Latest Scam):
                       Scareware, also known as crimeware, or Rogues or "Rogue Anti-Spyware"often appears as a fake antivirus alert on a web page. If you believe the alert and download the fake antivirus program, it will inform you that you have viruses on your system. The antivirus program asks for a credit card number, insisting on a payment before “fixing” your system. Scareware holds your system hostage until you pay or remove it.

</Ransomware>:
                        Ransomware will encrypt personal user data or block your entire PC. Once you have paid the "ransom" through an anonymous service, your PC will be unblocked.

</Adware>:
                    Adware is derived from "advertisement". Beside the actual function of the software, the user will see advertisements. Adware itself is not dangerous, but tons of displayed adverts are considered a nuisance and thus are detected by good anti-malware solutions.

</Dialers>:
                       Dialers are relics from a time when modems or ISDN were still used to go online. They dialed expensive premium-rates numbers and thus caused your telephone bill to reach astronomic amounts, which meant enormous financial damage to you, the poor victim, who did not even know they were there. Dialers have no effect on ADSL or cable connections, which is why they are mostly considered extinct nowadays.
Share this article :

Post a Comment

 
Support : Credits @Awaken Anonymous(Unknown) | Edited Template | Mas Template
Copyright © 2011. Free downloads - All Rights Reserved
Template Created by Creating Website Published by Mas Template
Proudly powered by Blogger
Blogger Widgets